Author of the publication

Performance Evaluation of Cyber-Physical Intrusion Detection on a Robotic Vehicle.

, , and . CIT/IUCC/DASC/PICom, page 2106-2113. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Denial of Service Attacks with Bayesian Classifiers and the Random Neural Network., , and . FUZZ-IEEE, page 1-6. IEEE, (2007)Performance Evaluation of Cyber-Physical Intrusion Detection on a Robotic Vehicle., , and . CIT/IUCC/DASC/PICom, page 2106-2113. IEEE, (2015)An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks., , and . SERA, page 371-378. IEEE, (2017)Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of Internet history., , , and . Digit. Investig., (2016)HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles., , , , , and . IEEE Access, (2022)A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality., , , , , , and . IEEE Access, (2019)Blockchain-Based Mobile Edge Computing Framework for Secure Therapy Applications., , , , , , and . IEEE Access, (2018)Digital Deception: Cyber Fraud and Online Misinformation., , and . IT Prof., 22 (2): 19-20 (2020)Self-Configurable Cyber-Physical Intrusion Detection for Smart Homes Using Reinforcement Learning., , , and . IEEE Trans. Inf. Forensics Secur., (2021)CROSS: A framework for cyber risk optimisation in smart homes., , , and . Comput. Secur., (2023)